Network Deployment Engineer Resume
New York, DallaS
SUMMARY:
- 8 years of professional experience in Network Planning, Implementing, Configuring, Troubleshooting and Testing of networking system on both Cisco and Juniper Networks
- Experience with the escalation problems for Routing, Switching and WAN connectivity issues using ticketing system remedy
- Experience of routing protocols like EIGRP, OSPF, RIP, and BGP
- Worked on Cisco 7200, 3800, 3600, 2800, 2600, 1800 series Routers and Cisco 2900, 3500, 4500, 5500, series switches
- Extensive hands - on experience with complex routed LAN and WAN networks, routers and switches
- Hands-on configuration and experience in setting up Cisco routers to perform functions at the Access, Distribution, and Core layers
- Experience in the setup of Access-Lists, and RIP, EIGRP, and tunnel installations
- Proficiency in configuration of VLAN setup over various Cisco Routers and Switches
- Experienced in trouble-shooting both connectivity issues and hardware problems on Cisco based networks
- Enhanced level of experience with OSPF, BGP, and TCP/IP
- Hands-on experience in using network stimulator tool OPNET.
- Strong knowledge on cisco ISE.
- Excellent leadership with good written and oral communication.
- Good knowledge on Cisco RSA.
- Great team player and able to work under pressure 24x7 duty rotation.
- Strong knowledge in HSRP, VRRP redundancy Protocols.
- Experience in Network Management Tools and sniffers like SNMP, HP-Open view, Wireshark and Cisco works to support 24 x 7 Network Operation Center.
- Experience in physical cabling, IP addressing and subnetting with VLSM, configuring and supporting TCP/IP, DNS, installing and configuring proxies.
- Access control server configuration for RADIUS & TACAS+.
- Sound knowledge in CISCO firewalls, CISCO PIX, ASA 5500 series and CISCO ASA as well as encryption techniques.
- Hands-on experience using Cisco Virtual Switching System (VSS).
- Good knowledge on Bluecoat proxy server SG• Knowledge of advanced technologies like VOIP, H.323, SIP, QOS, Multicasting, MPLS and MPLS-VPN
- Experience with 802.11x wireless technology.
- Implementation and Configuration (Profiles, I Rules) of F5 Big-IP LTM-6400 load balancers
- Ability to Install, Manage & Troubleshoot Large Networks & Systems Administration on Windows & Linux platforms in Development, Lab & Production Environments.
- Good knowledge of CISCO NEXUS data center infrastructure with 50 00 and 70 00 series switches includes (5548, 7010) including CISCO NEXUS Fabric Extender (223, 2248)
- Hands-on Experience with CISCO Nexus 7000, Nexus 5000, and Nexus 2000 platforms.
- Sound knowledge of virtual firewalls like checkpoint VSX, IDS, IPS as well as encryption techniques.
- Good knowledge on AWS Implementations.
TECHNICAL SKILLS:
Protocols: RIP, RIP V2, EIGRP, OSPF, IS-IS, IGRP, HSRP, VRRP, GLBP, LACP, PAGP, DNS, SMTP, SNMP, FTP, TFTP, LPD/TDP, WLAN, 802.11/802.11 e, WEP, POP3 LADP, TNS.
LAN Technologies: Workgroup, Domain, HSRP, DHCP, Static, VLAN, STP, VTP, Ether Channel, Trunks.
WAN Technologies: Leased Line, Frame Relay, ISDN, PPP, HDLC, ATM, SONET, Metro Ethernet.
Network Products: CISCO Routers 1700, 1800, 2500, 2600, 2800. CISCO High End Router 3600, 3800, 7200, 12010. CISCO Switches 1900, 2950, 2960. CISCO Campus Switches 3550XL, 4984 Core Catalyst 4503, 4507 RE, Catalyst 6500/6503/6507.
Security & VPN: PIX 500 Firewall, ASA 5505 Firewall, AIP SSM, CSC SSM, FWSM, Fortigate, CISCO CSM, ACL- Access Control List, IPS/IDS, NAT, PAT, CISCO ACS, Check point (3200, 5800, 15 400 and 15 600 ) sonicwall, RSA SecureID, SRX,SSG series firewalls, Cisco ISE
Authentication: RADIUS, TACACS+, Digital certificates
Monitoring Tools: Wireshark, Nmap, Nessus, OpManager, PRTG Packet Sniffer
Servers: Domain servers, DNS servers, WINS servers, Mail servers, Proxy Servers, Print Servers, Application servers, FTP servers, Avocent Console server.
Operating Systems: Windows NT 4.0 (Desktop/Server), Windows 2000/2003/2008 server, Windows XP/7, LINUX, Solaris, Red Hat, Active Directory, UNIX,junos.
Languages: C, C++, .Net, Java, J2EE, XML, SQL, Perl and Python
Storage (SAN & NAS): EMC, HP, NetApp: VNX, VMAX, XTREMIO, 3Par and EVA
PROFESSIONAL EXPERIENCE:
Confidential, New York/ Dallas
Network Deployment Engineer
Responsibilities:
- Responsible for designing network infrastructure and implementing EIGRP, OSPF, BGP routing protocols on various networking devices and performed troubleshooting on Remote infrastructure management of campuses in different locations
- Built site-to-site IPSEC VPN Tunnels on Cisco ASA’s to facilitate adding new business partners to new and existing infrastructures
- Worked extensively on checkpoint firewalls
- Involved in the configuration & troubleshooting of routing protocols: OSPF, EIGRP and BGP across various customer sites.
- Performed Troubleshooting and escalation management of day-to-day issues for campuses. Deployed network devices based on new designs in Datacenter infrastructure
- Redefined the existing infrastructure with Arista devices and developed network design documentation and presentations using VISIO
- Designed and Implemented policies and zones on Palo Alto 7050 Chassis Internet firewall for incoming and outgoing traffic
- Involved in Configuration of Access lists (ACL) on ASA for the proper network routing for the B2B network connectivity and added exposure to ASA fire power
- Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools
- Actively worked on switching tasks that includes VTP, IPSec and GRE Tunneling, VLANs, Ether Channel, Trunking, Port Security, STP and RSTP.
- Maintained Infoblox for IP assignments and reservations for both private and public ranges
- Conversions to BGP WAN routing. Which will be to convert WAN routing from OSPF to BGP (OSPF is used for local routing only) which involves new wan links.
- Migrated site to site VPN tunnels from router infrastructure to redundant ASA infrastructure
- Responsible for layer 2 securities which was implemented using a dedicated VLAN ID for all trunk ports, setting the user ports to non-trunking, deployed port security when possible for user ports
- Designing F5 solutions/support for migration work of applications and websites from Cisco CSS Load Balancers to the F5 BigIP Load Balancers
- Experience with configuring Virtual Server and Configuring Load balancing methods in F5 LTM
- Experience with design and implementation of Data center migration
- Upgrade Cisco 6500, 3750, 2960s, Nexus 5000, Nexus 2000, Nexus 7000 switch IOS/NX-OS software
- Worked extensively with Nexus 7000, 5000, 2000, Cisco 6500 series multilayer switches, Cisco 2960s series switches and Cisco 3560/3750s switches
- Strong Knowledge in working with F5 Load Balancers and their Implementation in various Networks.
- Identify, design and implement flexible, responsive, and secure technology services
- Implemented Positive Enforcement Model with the help of Palo Alto Networks.
- Worked extensively on Cisco ASA 5555-X Series, Implemented site to site VPN’s and any connect services
- Implemented Palo Alto 7050 Firewall in HA Pairs as an internet firewall, Configured rules and Zones based on traffic
- Migrated cisco 4500 Data center network devices to arista 7010/7060 series switches as a part of Spine and Leaf topology.
- Performed all levels of monitoring, design, troubleshooting and implementations on Cisco Prime Infrastructure
- Designed ACLs, VLANs, troubleshooting IP addressing issues and taking back up of the configurations on switches and router
- Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree for creating Access/distribution and core layer switching architecture
- Monitored latency, bandwidth utilization, and the general condition of the WAN; reported on problems to the peer teams on a real-time basis
- Demonstrated expertise under Incident Management Process, Responsible for Assigning, managing, and resolving Incident Tickets within the specified Service Level Agreements/Operational Level Agreements
- Performed periodic checks on implemented enterprise policies and user rights from the ISE logs to ensure security compliances
- Involved in troubleshooting LAN connectivity, hardware issues in the network, IP addressing issues, created a backup and recovery policy for software application, verified the working of peripherals and Updating IOS images using TFTP
- Help customers build scalable, resilient, and high-performance applications and services on AWS
- Develop/capture/document architectural best practices for building systems on AWS
- Maintained wireless IPS infrastructure and coordinated with management, customers and peers regarding wireless network innovations
- Configuration of firewalls, implementing Site to Site and any connect VPN's and maintaining policies and zones on firewalls
- Extensive experience with OSI layer model
- Remote support of on-site engineers and end users/customers during installation
- Actively worked on Change and Incident managements and audit of IP addressing and hosted devices within data centers
- Offered users with wireless network technical support and handled indoor and outdoor site surveys.
- Deployed the switches in high availability configuration with HSRP/VRRP.
- Monitored network for optimum traffic distribution and load balancing using Solar winds
- Worked on Wireshark for packet capturing
- Implemented security measures to keep networks running and secure. Configured extended ACLs to filter traffic and gave restricted access to certain users
- Responsible for developing and maintaining online documentation and resources pertaining to wireless network
Confidential, Dallas, TX
Sr. Network Engineer
Responsibilities:
- Configuration and Administration of Cisco and Juniper Routers and Switches
- Experience working with Nexus 7010, 5548, 5596, 2148, 2248 devices.
- Implemented Site-to-Site VPNs over the internet utilizing 3DES, AES/AES-256
- Hands on Experience testing I Rules using Browser (IE), HTTP watch for f5 load balancers.
- Configure and troubleshoot Juniper EX series switches and routers
- Experience with moving data center from one location to another location, from 6500 based data center to Nexus based data center
- Network Redesign for Small Office/Campus Locations. This includes changes to both the voice and data environment
- Network security including NAT/PAT, ACL, and ASA Firewalls.
- Worked extensively on Cisco ASA 5500(5510/5540) Series, experience with convert PIX rules over to the Cisco ASA solution.
- Good knowledge with the technologies VPN, WLAN and Multicast.
- Installation and Configuration of Cisco Catalyst switches 6500, 3750 & 3550 series and configured routing protocol OSPF, EIGRP, BGP with Access Control lists implemented as per Network Design Document and followed the change process as per IT policy It also includes the configuration of port channel between core switches and server distribution switches
- Experience with communicating with different with different customers, IT teams in gathering the details for the project
- Installed dual DS-3 SAN replication WAN with Riverbed Interceptors and 6050 Steelhead appliances to optimize the traffic
- Configuring rules and Maintaining Palo Alto Firewalls & Analysis of firewall logs using various tools
- Switching tasks include VTP, ISL/ 802.1q, IPSec and GRE Tunneling, VLANs, Ether Channel, Trunking, Port Security, STP and RSTP.
- Replace branch hardware with new 3900 routers and 3850 switches.
- Installed and Configured the F5 BIG-IP LTM, configure virtual servers and associate them with pools for internal web servers.
- Enabled STP attack mitigation (BPDU Guard, Root Guard), using MD5 authentication for VTP, disabling all unused ports and putting them in unused VLAN and ensuring DHCP attack prevention where needed.
Confidential, ROCKVILLA, MD
Network Engineer
Responsibilities:
- Configuring, Maintaining the Routers and Switches and Implementation of EIGRP, OSPF, BGP routing protocols and troubleshooting Remote infrastructure management of offices in different locations nationwide.
- Troubleshooting and escalation management of day-to-day issues for offices. Managing Co-location and Datacenter infrastructure in North America.
- Experience with Project data and voice documentation tools & experience with developing network design documentation and presentations using VISIO
- Security policy review and configuration in Palo Alto and Junipers Firewall in US offices and Datacenter.
- Involved in Configuration of Access lists (ACL) on checkpoint firewall for the proper network routing for the B2B network connectivity
- Created effective network security by migrating from Check Point FW-1 NG to ASA 5510 Firewalls
- Designed and configured of OSPF, BGP on Juniper Routers and SRX Firewalls.
- Analyzed customer application and bandwidth requirements, ordered hardware and circuits, and built cost effective network solutions to accommodate customer requirements and project scope
- Installing, configuring, and maintaining Cisco Switches (2900, 3500, 7600, 3700 series, 6500 series) Cisco Routers (4800, 3800, 3600, 2800, 2600, 2900, 1800, 1700, 800)
- Built site-to-site IPSec VPNs over Frame-relay & MPLS circuits on various models of Cisco routers to facilitate adding new business partners to new and existing infrastructures.
- Configured RIP, PPP, BGP and OSPF routing.
- Responsible for Checkpoint firewall management and operations across our global networks.
- Working with Checkpoint Support for resolving escalated issues
- Data center migration was involved in Access, Distribution and Core layers
- Involved in the configuration & troubleshooting of routing protocols: MP-BGP, OSPF, LDP, EIGRP, RIP, BGP v4. Configured IP access filter policies.
- Experience with configuring Virtual Server and Configuring Load balancing methods in F5 LTM
- Experience with design and implementation of Data center migration.
- Expert in configuring Cisco Routers, Catalyst Switches, Nexus Switches.
- Upgrade Cisco 6500, 3750, 2960s, Nexus 5000, Nexus 2000, Nexus 7000 switch IOS software
- Worked extensively with Nexus 7000, 5000, 2000, Cisco 6500 series multilayer switches, Cisco 2960s series switches and Cisco 3560/3750s switches
- Strong Knowledge in working with F5 Load Balancers and their Implementation in various Networks.
- Identify, design and implement flexible, responsive, and secure technology services
- Implemented Positive Enforcement Model with the help of Palo Alto Networks.
- Innovated with support of Palo Alto for remote and mobile users and for analyzing files for malware in a separate (cloud-based) process that does not impact stream processing.
- Establish AWS technical credibility with customers and external parties
- Help customers build scalable, resilient, and high-performance applications and services on AWS
- Develop/capture/document architectural best practices for building systems on AWS
- Release management of all significant public EC2 launches
- Managed complex wireless network strategies and imparted support to operational wireless computer networks.
- Maintained wireless IPS infrastructure and coordinated with management, customers and peers regarding wireless network innovations.
- Offered users with wireless network technical support and handled indoor and outdoor site surveys.
- Experience with Firewall Administration, Rule Analysis, Rule Modification
- Deployed the switches in high availability configuration with HSRP.
- Configured UDLD, port-fast, uplink fast and other spanning tree features.
- Monitored network for optimum traffic distribution and load balancing using Solar winds.
- Implemented security measures to keep networks running and secure. Configured extended ACLs to filter traffic and gave restricted access to certain users.
- Supervised call center and technician routine maintenance and up-gradation of network device.
- Creating and provisioning Juniper SRX firewall policies.
- Provided network and workstation support.
- Responsible for developing and maintaining online documentation and resources pertaining to wireless network
- Practice network asset management, including maintenance of network component inventory and related documentation and technical specifications information.
- Interfaced with customers and senior management for problem resolution and project planning.
- Ensure network connectivity of all servers, workstations, telephony equipment, fax machines, and other network appliances
- Create and maintain documentation and Visio diagrams as it relates to network configuration, network mapping, processes, and service records.
- Oversee new and existing equipment, hardware, and software upgrades.
Environment: Cisco routers and switches, Site to Site VPN’s,OSPF, BGP, MPLS,EIGRP routing protocol, WAN Optimization, NEXUS 2K,5K,7K, 1000v, Cisco 6500, 3750, 2950 series, Juniper Net Screens, F5 BigIP, SNMP, NAT, TCP/IP, VLAN and Cisco firewalls (PIX and ASA) .
Confidential, Chicago, IL
Network Specialist
Responsibilities:
- Analyzed corporate LAN and WAN to determine the major problems and improvements needed to be made to the network infrastructure, as per the client requirements for network design, configuration, implementation and troubleshoot the network.
- Involved in troubleshooting LAN connectivity, hardware issues in the network, IP addressing issues, created a backup and recovery policy for software application, verified the working of peripherals and Updating IOS images using TFTP.
- Set up and troubleshoot 802.11 wireless networks.
- Working on configuring routing protocols (OSPF, BGP4, RIP, IGRP and EIGRP) and enterprise class switches-router management (Cisco 6509, 2800, 2900, 3750, 3800, 3900).
- Worked on supporting a wide variety of networking components including Cisco Routers, Switches, Wireless Access Points, MPLS, Frame-Relay, ATM, ISDN, BGP, EIGRP, OSPF and RIPv2
- Worked on F5 BIG-IP LTM, configured profiles provided and ensured high availability.
- Monitored network and servers to identify potential problems and bottleneck and troubleshoot to provide high performance.
- Interacted with support services to reduce the downtime on leased lines.
- Managed the IP address space using subnets and variable length subnet masks (VLSM) and Monitored the operability and reliability of the network.
- Daily responsibilities included monitoring remote site using network management tools, assisted in design guidance for infrastructure upgrade & help LAN administrator with backbone connection and connectivity issues.
- Modified and tested scripts and extended Linux system functionality as needed.
- Other responsibilities included researching and documenting the new monitoring solutions in the market which would suit the company needs.
Environment: Cisco routers and switches, Site to Site VPN’s,OSPF, BGP, MPLS,EIGRP routing protocol, WAN Optimization, NEXUS 2K,5K,7K, 1000v, Cisco 6500, 7600 series, DNS, DHCP, IIS WEB and FTP servers, VLAN, Nexus 5k, VLAN Trunking and OSI Layers.
Confidential
Network Associate
Responsibilities:
- Configured workstations for IP based LAN’s with Cisco Routers 2500, 3800, 2800 and implemented protocols RIPv2, OSPF, EIGRP and Cisco Switches 2 960 and 35 60 L2 and L3 security features on devices and configured DHCP Client/Server for the network designed.
- Designed and Configured VLANs for the two major divisions of the company the finance department and all others under one VLAN, and implemented VTP Trunking on switches.
- Configured VLANs with 802.1q tagging. Configured Trunk groups, ether channels, and Spanning tree for creating Access/distribution and core layer switching architecture.
- Worked on and configured Inter-vlan routing, redistribution, access-lists and dynamic NAT to have a control of which departments accesses the Finance department data.
- Complete periodic checks of production and development systems; CPU utilization, memory profiles, disk utilization, network connectivity, and system log files
- Created users and groups and assigned privileges to them, as a part of Network Security.
- Worked with senior network engineers for multiple site Upgrades for data and VOIP equipments and also in re-configuring the new device and making sure projects are done under defined project timelines.
- Responsible for the installation of various software components on several servers, Backing up and restoring files across the network, Troubleshooting backup and restore problems and performed day-to-day trouble shooting for the end users and OS upgrades.
- Other responsibilities included Administrative tasks such as System Startup/Shutdown, Printing Documentation, User Management, Security, Network management.
Environment: Cisco routers and switches, Cisco 2500, 2600, 3000, 6500, 7500, 7200, Juniper SRX, SNMP, NAT, TCP/IP and Checkpoint ESX/GSX firewall
Confidential
Network Engineer
Responsibilities:
- Installed and supported LANs, WANs, network segments, and Internet, and also maintained network hardware such as Cisco routers 2600 series, 2800 series, 3600 series, 3800 series and Cisco switches
- Configuration and troubleshooting issues related to access lists and DNS/DHCP issues within the LAN network.
- Worked with senior network engineers for multiple site Upgrades for data and VOIP equipments and also in re-configuring the new device and making sure projects are done under defined project timelines.
- Monitored networks to ensure security and availability to specific users and modified system's performance based on the network and system requirements and to maintain integrity of the network, server deployment, and security.
- Maintained and provided Level 2 and Level 3 technical supports for all network related issues and providing the requirements of the customer by interacting with the customer on daily basis via email and phone.
- Created a detailed design drawing of the sites, which are under up-gradation and getting it validate from the technical design team and maintained the remote site network, consisting of QoS design, IP addressing, Visio Drawings.
- Responsibilities included Creating Lab demonstrations for new technology deployments with loaner equipment from various vendors and presented the findings to upper management.
- Other responsibilities included monitoring and managing servers, desktop computers, printers, routers, switches, phones, and security updates.
Environment: VLAN, STP, RSTP, VRRP, and Ether Channel, OSPF, IGRP, RIPv2, EIGRP and RSTP, MST